Information Security Chapter 2

5 October 2022
4.7 (114 reviews)
75 test answers

Unlock all answers in this set

Unlock answers (71)
question
Compared to Web site defacement, vandalism within a network is less malicious in intent and more public.
answer
False
question
A mail bomb is a form of DoS.
answer
True
question
Intellectual property is defined as "the ownership of ideas and control over the tangible or virtual representation of those ideas."
answer
True
question
Information security's primary mission is to ensure that systems and their contents retain their confidentiality at all costs.
answer
False
question
Once a(n) back door has infected a computer, it can redistribute itself to all e-mail addresses found on the infected system.
answer
False
question
Cyberterrorists hack systems to conduct terrorist activities via network or Internet pathways.
answer
True
question
A firewall is a mechanism that keeps certain kinds of network traffic out of a private network.
answer
True
question
Sniffers often work on TCP/IP networks, where they're sometimes called packet sniffers.
answer
True
question
A(n) polymorphic threat is one that over time changes the way it appears to antivirus software programs, making it undetectable by techniques that look for preconfigured signatures.
answer
True
question
Hackers are "people who use and create computer software to gain access to information illegally."
answer
True
question
DoS attacks cannot be launched against routers.
answer
False
question
The term phreaker is now commonly associated with an individual who cracks or removes software protection that is designed to prevent unauthorized duplication.
answer
False
question
Two watchdog organizations that investigate allegations of software abuse: SIIA and NSA.
answer
False
question
A worm can deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected.
answer
True
question
Organizations can use dictionaries to disallow passwords during the reset process and thus guard against easy-to-guess passwords.
answer
True
question
Packet kiddies use automated exploits to engage in distributed denial-of-service attacks.
answer
False
question
With electronic information is stolen, the crime is readily apparent.
answer
False
question
When voltage levels surge (experience a momentary increase), the extra voltage can severely damage or destroy equipment.
answer
False
question
The application of computing and network resources to try every possible combination of options of a password is called a brute crack attack.
answer
False
question
An act of theft performed by a hacker falls into the category of "theft," but is also often accompanied by defacement actions to delay discovery and thus may also be placed within the category of "forces of nature."
answer
False
question
A worm requires that another program is running before it can begin functioning.
answer
False
question
With the removal of copyright protection, software can be easily distributed and installed.
answer
True
question
Information security safeguards the technology assets in use at the organization.
answer
True
question
Forces of nature, force majeure, or acts of God can present some of the most dangerous threats, because they are usually occur with very little warning and are beyond the control of people.
answer
True
question
A sniffer program shows all the data going by on a network segment including passwords, the data inside files—such as word-processing documents—and screens full of sensitive data from applications.
answer
True
question
A number of technical mechanisms—digital watermarks and embedded code, copyright codes, and even the intentional placement of bad sectors on software media—have been used to enforce copyright laws.
answer
True
question
The malicious code attack includes the execution of viruses, worms, Trojan horses, and active Web scripts with the intent to destroy or steal information.
answer
True
question
One form of e-mail attack that is also a DoS is called a mail spoof, in which an attacker routes large quantities of e-mail to the target.
answer
False
question
The macro virus infects the key operating system files located in a computer's boot sector.
answer
False
question
Expert hackers are extremely talented individuals who usually devote lots of time and energy to attempting to break into other people's information systems.
answer
True
question
A timing attack involves the interception of cryptographic elements to determine keys and encryption algorithms.
answer
True
question
The shoulder looking technique is used in public or semipublic settings when individuals gather information they are not authorized to have by looking over another individual's shoulder or viewing the information from a distance.
answer
False
question
Attacks conducted by scripts are usually unpredictable.
answer
False
question
Much human error or failure can be prevented with training and ongoing awareness activities.
answer
True
question
A(n) cookie can allow an attacker to collect information on how to access password-protected sites.
answer
True
question
In a ____ attack, the attacker sends a large number of connection or information requests to a target.
answer
Denial-Of-Service
question
In the context of information security, ____________________ is the process of using social skills to convince people to reveal access credentials or other valuable information to the attacker.
answer
Social Engineering
question
____ is any technology that aids in gathering information about a person or organization without their knowledge.
answer
Spyware
question
Attempting to reverse-calculate a password is called ____________________.
answer
Cracking
question
The ____ data file contains the hashed representation of the user's password.
answer
SAM
question
____ are software programs that hide their true nature, and reveal their designed behavior only when activated.
answer
Trojan Horses
question
A(n) ____________________ is a malicious program that replicates itself constantly, without requiring another program environment.
answer
Worm
question
A ____ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time.
answer
Distribution Denial-Of-Service
question
"4-1-9" fraud is an example of a ____ attack.
answer
Social Engineering
question
A momentary low voltage is called a(n) ____________________.
answer
Sag
question
When information gatherers employ techniques that cross the threshold of what is legal or ethical, they are conducting industrial ____________________.
answer
Espionage
question
Duplication of software-based intellectual property is more commonly known as software ____________________.
answer
Piracy
question
Acts of ____ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter.
answer
Trespass
question
____ are machines that are directed remotely (usually by a transmitted command) by the attacker to participate in an attack.
answer
Zombies
question
Script ____________________ are hackers of limited skill who use expertly written software to attack a system.
answer
kiddies
question
Which of the following is an example of a Trojan horse program?
answer
Happy99.exe
question
A(n) ____________________ is an object, person, or other entity that represents an ongoing danger to an asset.
answer
Threat
question
In the well-known ____ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network.
answer
Man-In-The-Middle
question
____________________ is a technique used to gain unauthorized access to computers, wherein the intruder sends messages with a source IP address that has been forged to indicate that the messages are coming from a trusted host.
answer
Spoofing
question
____________________ is unsolicited commercial e-mail.
answer
Spam
question
____ is an integrated system of software, encryption methodologies, and legal agreements that can be used to support the entire information infrastructure of an organization.
answer
PKI
question
A(n) ____________________ is an identified weakness in a controlled system, where controls are not present or are no longer effective.
answer
Vulnerability
question
The ____ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network.
answer
TCP
question
A computer virus consists of segments of code that perform ____________________ actions.
answer
Malicious
question
A(n) ____________________ is an application error that occurs when more data is sent to a program buffer than it is designed to handle.
answer
Buffer Overrun or Buffer Overflow
question
According to Mark Pollitt, ____ is the premeditated, politically motivated attacks against information, computer systems, computer programs, and data which result in violence against noncombatant targets by subnational groups or clandestine agents.
answer
Cyberterrorism
question
There are generally two skill levels among hackers: expert and ____.
answer
Novice
question
Which of the following functions does information security perform for an organization?
answer
Protecting the organization's ability to function, Enabling the safe operation of applications implemented on the organization's IT systems, and Protecting the data the organization collects and uses.
question
A virus or worm can have a payload that installs a(n) ____________________ door or trap door component in a system, which allows the attacker to access the system at will with special privileges.
answer
Back
question
As frustrating as viruses and worms are, perhaps more time and money is spent on resolving virus ____.
answer
Hoaxes
question
A(n) ____________________ is an act that takes advantage of a vulnerability to compromise a controlled system.
answer
Attack
question
ESD means electrostatic ____________________.
answer
Discharge
question
Some information gathering techniques are quite legal, for example, using a Web browser to perform market research. These legal techniques are called, collectively, competitive ____________________.
answer
Intelligence
question
A(n) ____________________ hacks the public telephone network to make free calls or disrupt services.
answer
Phreaker
question
Web hosting services are usually arranged with an agreement providing minimum service levels known as a(n) ____.
answer
SLA
question
The timing attack explores the contents of a Web browser's ____________________.
answer
Cache
question
Microsoft acknowledged that if you type a res:// URL (a Microsoft-devised type of URL) which is longer than ____ characters in Internet Explorer 4.0, the browser will crash.
answer
256
question
One form of online vandalism is ____ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency.
answer
Hacktivist
question
Complete loss of power for a moment is known as a ____.
answer
Fault
question
The expert hacker sometimes is called ____________________ hacker.
answer
Elite